Page 21 - Winter 2019 2020 FINAL_Neat
P. 21

Page 21_Layout 1  15/01/2020  15:33  Page 1




                                                                            Charles told us these kinds
                                                                            of phone call tend to come in   21
                                                                            ‘batches’ of two or three per
                                                                            day, before going quiet for a week
                                                                            or so. He says there’s no indication
                                                                            that the call is a spoof until he picks
                                                                            up the phone, and it is only because
                                                                            he is savvy to the kinds of scams
                                                                            taking  place  that  he  immediately
                                                                            hangs up and blocks the number.
                                                                                 ‘I did once continue a conver-
                                                                            sation with a man who said I had a
                                                                            problem with my computer, just to
                                                                            see how they worked,’ he says. ‘I
             didn’t follow any of the instructions of accessing the web address he gave me – I worked in IT
             before I retired, so I knew I wouldn’t do anything which would allow him to take control of my
             computer.’ Unfortunately, not everyone would have had this knowledge.
                   And whilst it’s possible to cut down calls by registering your number

                         Telephone Preference Service
             with the Telephone Preference Service, this is designed to stop legiti-
             mate companies calling you, not criminals.
                   Charles certainly isn’t alone. We ran a straw poll on Twitter asking our followers if any of
             them had been the target of number spoofing, with 28% saying it had happened to them.
                    Read more: https://www.which.co.uk/news/2019/10/whos-really-call-
                 ing-you-an-investigation-into-the-worrying-rise-of-number-spoofing/ -

                                                          Which?
             How do the scammers do it? For the problem to have become so widespread, it’s fair to assume
             that number spoofing has become the weapon of choice for lots of scammers around the world.
             But how do they go about it, and why is has it become so popular? ‘A caller ID can be spoofed
             easily, and for free, using software that is shared online,’ explains Ray Walsh, digital privacy ex-
             pert at proprivacy.com.
                   ‘Scammers start by finding the number they want to spoof, either online or via white pages.
             ‘Next, they enter that number into the software. Once the number is saved, any outbound call
             that is made via the software will register on the recipient’s end as the spoofed number.’ As
             we’ve seen, the chosen number could be someone
             else’s  landline  number,  your  banks,  or  any  other
             company.
                   ‘Using  a  recognised  number  massively  in-
             creases the chances that a scammer will be able to
             engage with a victim, often using specially-written
             scripts that are designed to trick people into saying
             and doing things the spammer wants,’ says Ray.
                   ‘Most often this leads to the victim parting with
             sensitive personal information, be it payment details
             in order to drain their bank funds, or amassing per-
             sonal data that can be used in future phishing and
             hacking attempts.’
                   ‘Getting  account  login  details  is  much  more
             common,’ says Sharif Gardner, head of training and advisory services at Axis Capital. ‘Depend-
             ing on how sophisticated the scammer is, they might start off innocuously, and then build up in-
             formation from you.’ In some cases, however, scammers won’t even want your login information;
             just your voice can be enough. ‘Personal information has gone beyond your login details now,’
   16   17   18   19   20   21   22   23   24   25   26